Static task
static1
Behavioral task
behavioral1
Sample
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe
Resource
win7-20240903-en
General
-
Target
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe
-
Size
296KB
-
MD5
58a8dfb8445a6d57c7488c5a7642dd09
-
SHA1
add33aa5aeb180e51379956913f43d036612e351
-
SHA256
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5
-
SHA512
a026974191030952f9ee7f1eb1343b76bcfedd4385dfb5f605438c15884bc5e2692f4bfb2410308fc44028d1fb2c6d61a49d75ca2eb4aad3e2cb9601fe49deba
-
SSDEEP
6144:7MDcW16ZwIJssQ8Uy4UcYZVTc2rPzjJOHAOgxqqDLu2lt:7MDV1EEd+4UcUVTjPEHRqnu4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe
Files
-
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe.exe windows:4 windows x86 arch:x86
e3571dd5a9e9b81772c8cabcd924caff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharUpperA
CharLowerA
kernel32
CreateThread
QueryPerformanceCounter
QueryPerformanceFrequency
CloseHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTickCount
GetProcAddress
LoadLibraryA
FreeLibrary
SetConsoleMode
GetStdHandle
SetConsoleCursorPosition
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
SetConsoleWindowInfo
SetConsoleScreenBufferSize
AllocConsole
GetEnvironmentVariableA
SetLocalTime
GetLocalTime
OutputDebugStringA
GetConsoleMode
ReadConsoleInputA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
SetEndOfFile
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCPInfo
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
HeapAlloc
HeapFree
HeapReAlloc
RtlUnwind
GetLastError
DeleteFileA
ExitThread
GetCurrentThreadId
ExitProcess
GetModuleHandleA
TerminateProcess
GetCurrentProcess
RaiseException
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
ReadFile
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
WriteFile
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlushFileBuffers
GetCurrentProcessId
GetFileAttributesA
CreateFileA
WideCharToMultiByte
GetTimeZoneInformation
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InterlockedExchange
wsock32
getsockname
gethostname
sendto
WSAGetLastError
recvfrom
gethostbyname
socket
setsockopt
inet_ntoa
bind
htons
WSACleanup
WSAStartup
closesocket
ioctlsocket
inet_addr
htonl
ntohs
winmm
timeGetTime
timeBeginPeriod
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�"�&�u� Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE